ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:TechTarget ComputerWeekly.com

  • 7 top predictive analytics use cases

    Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.

  • Beginner's guide to Internet of Things

    The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.

  • CW APAC: Expert advice on data analytics

    In this handbook, focused on data analytics in the Asia-Pacific region, Computer Weekly looks at how to marry the art and science of analytics, environmental considerations, the risks of sovereign data strategies and what one telco has done to address scalability challenges.

  • 12 API security best practices

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

  • Computer Weekly – 14 February 2023: Where next for NHS IT?

    In this week's Computer Weekly, as NHS Digital is folded into NHS England, we consider what the merger could mean for the future of NHS IT. We find out how data science and analytics has become an increasingly important function for John Lewis. And we examine the importance of building empathy into metaverse applications. Read the issue now.

  • 5 types of data security

    Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. This infographic gives an overview of the must-have data security technologies.

  • 8 big data use cases for businesses and industry examples

    For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.

  • 10 common uses for machine learning applications in business

    Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:

  • Multifactor authentication: What are the pros and cons?

    One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.

  • Computer Weekly - 31 January 2023: How the cost-of-living crisis is affecting IT

    In this week's Computer Weekly, we examine what the cost-of-living crisis means for IT leaders and tech professionals. We analyse what you need to consider when reversing systems out of the cloud and back on-premise. And Very Group's CIO talks about the post-pandemic challenges facing online retailers. Read the issue now.

  • Computer Weekly - 24 January 2023: BBC under scrutiny over its digital strategy

    In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.

  • The ultimate guide to identity & access management

    Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.

  • 19 machine learning interview questions and answers

    Aspiring machine learning job candidates should be fluent in varied aspects of machine learning, from statistical theory and programming concepts to general industry knowledge. Read our list of commonly asked machine learning questions and accompanying answers to help you prepare for your interview.

  • Trend Watch: CIO trends

    In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at predictions for 2023, how the Australian Red Cross managed a donation surge, Mondelez's digital transformation and Singapore's public sector IT strategy.

  • How do cybercriminals steal credit card information?

    Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.

  • Infographic: 5 cybersecurity trends for 2023

    The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.

  • Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth

    In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.

  • Top 10 ANZ IT stories of 2022

    In this roundup, Computer Weekly recaps the top 10 stories in Australia and New Zealand (ANZ), including the opportunities and challenges that organisations in the region have faced over the past year.

  • Top 10 ASEAN IT stories of 2022

    Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.

  • Top 10 India IT stories of 2022

    In this roundup, we recap the top 10 stories in India, including the digitisation work undertaken by global firms in the country, progress made by local enterprises in harnessing technology and how a female coder rose through the ranks in her software development career.

  • Fail to prepare quality data, prepare to fail

    Fail to prepare, prepare to fail is an adage that never fails to lose its veracity. The same is true of using poor quality data, known to be the bane of the lives of data analysts, not to speak of organisations that yearn to be "data driven".

  • Top IT Predictions in APAC in 2023

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

  • Computer Weekly – 7 February 2023: Making IT security training stick

    In this week's Computer Weekly, our buyer's guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors. Read the issue now.

  • CW EMEA – February 2023: Kyiv is ready for anything

    In this issue of CW EMEA, the CIO at Kyiv City Council explains how its IT team has kept services running for residents amid relentless bombing by Russia. We also look at the Netherlands’ plans to regulate AI to reduce bias, how highly accurate time protocols ensure fair trading, and the use of tech in agriculture in Denmark. Read the issue now.

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.